{"id":"https://openalex.org/W4313459178","doi":"https://doi.org/10.1109/iccr56254.2022.9996070","title":"Cryptography in Network Security","display_name":"Cryptography in Network Security","publication_year":2022,"publication_date":"2022-10-06","ids":{"openalex":"https://openalex.org/W4313459178","doi":"https://doi.org/10.1109/iccr56254.2022.9996070"},"language":"en","primary_location":{"id":"doi:10.1109/iccr56254.2022.9996070","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9996070","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080656553","display_name":"Shivam Shivam","orcid":null},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Shivam","raw_affiliation_strings":["Chandigarh University,Department of Computer Science,Gharuan,Punjab,India","Department of Computer Science, Chandigarh University, Gharuan, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India","institution_ids":["https://openalex.org/I101407740"]},{"raw_affiliation_string":"Department of Computer Science, Chandigarh University, Gharuan, Punjab, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082739889","display_name":"Sugandhi Midha","orcid":null},"institutions":[{"id":"https://openalex.org/I101407740","display_name":"Chandigarh University","ror":"https://ror.org/05t4pvx35","country_code":"IN","type":"education","lineage":["https://openalex.org/I101407740"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sugandhi Midha","raw_affiliation_strings":["Chandigarh University,Department of Computer Science,Gharuan,Punjab,India","Department of Computer Science, Chandigarh University, Gharuan, Punjab, India"],"affiliations":[{"raw_affiliation_string":"Chandigarh University,Department of Computer Science,Gharuan,Punjab,India","institution_ids":["https://openalex.org/I101407740"]},{"raw_affiliation_string":"Department of Computer Science, Chandigarh University, Gharuan, Punjab, India","institution_ids":["https://openalex.org/I101407740"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041858203","display_name":"Bharti Ramola","orcid":"https://orcid.org/0000-0003-3580-3543"},"institutions":[{"id":"https://openalex.org/I3132702812","display_name":"Uttaranchal University","ror":"https://ror.org/00ba6pg24","country_code":"IN","type":"education","lineage":["https://openalex.org/I3132702812"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bharti Ramola","raw_affiliation_strings":["Uttaranchal University,Dehradun,India,248007"],"affiliations":[{"raw_affiliation_string":"Uttaranchal University,Dehradun,India,248007","institution_ids":["https://openalex.org/I3132702812"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5080656553"],"corresponding_institution_ids":["https://openalex.org/I101407740"],"apc_list":null,"apc_paid":null,"fwci":0.61,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.67443325,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.78075110912323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6985068321228027},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6535356044769287},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6229509115219116},{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.5029281973838806},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.4992830753326416},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.47418007254600525},{"id":"https://openalex.org/keywords/strong-cryptography","display_name":"Strong cryptography","score":0.46125543117523193},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4443601369857788},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4045501947402954},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2002289891242981}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.78075110912323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6985068321228027},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6535356044769287},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6229509115219116},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.5029281973838806},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.4992830753326416},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.47418007254600525},{"id":"https://openalex.org/C165922616","wikidata":"https://www.wikidata.org/wiki/Q4241181","display_name":"Strong cryptography","level":3,"score":0.46125543117523193},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4443601369857788},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4045501947402954},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2002289891242981},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccr56254.2022.9996070","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iccr56254.2022.9996070","pdf_url":null,"source":{"id":"https://openalex.org/S4363608155","display_name":"2022 International Conference on Cyber Resilience (ICCR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Conference on Cyber Resilience (ICCR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5099999904632568}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2066460425","https://openalex.org/W2294582574","https://openalex.org/W2532630045","https://openalex.org/W2946427611","https://openalex.org/W2986929064","https://openalex.org/W2988809393","https://openalex.org/W2999958824","https://openalex.org/W3013375325","https://openalex.org/W3015505427","https://openalex.org/W3153101709","https://openalex.org/W3178340391","https://openalex.org/W3185636585","https://openalex.org/W4241417662","https://openalex.org/W4296046853"],"related_works":["https://openalex.org/W2065250680","https://openalex.org/W2348567840","https://openalex.org/W2390665136","https://openalex.org/W2092708554","https://openalex.org/W2353177111","https://openalex.org/W4206199931","https://openalex.org/W2336014427","https://openalex.org/W2379266188","https://openalex.org/W2608550600","https://openalex.org/W2107572894"],"abstract_inverted_index":{"The":[0,16],"goal":[1],"of":[2,11,18,35,71,118,131],"this":[3],"study":[4],"is":[5,21,31,76,79],"to":[6,23,122,174],"provide":[7],"a":[8,81,116,129,144],"thorough":[9],"overview":[10],"encryption":[12,63,107,132],"in":[13,51,87,111],"information":[14,49],"security.":[15,67],"method":[17],"protecting":[19],"data":[20,37,55,74],"referred":[22],"as":[24,136,138],"cryptography.":[25],"Network":[26],"security,":[27],"on":[28],"either":[29],"hand,":[30],"indeed":[32],"the":[33,69,95,159],"act":[34],"maintaining":[36],"private,":[38],"secret,":[39],"and":[40,44,54,65,73,84,101,108,120,125,143,147,155,168],"safe":[41],"from":[42],"unwanted":[43],"unlawful":[45],"access.":[46],"To":[47],"safeguard":[48],"stored":[50],"our":[52,60,175],"systems":[53],"exchanged":[56],"over":[57],"wireless":[58],"networks,":[59],"services":[61],"use":[62,70],"communication":[64],"network":[66,109],"Because":[68],"computing":[72],"networking":[75],"rising,":[77],"security":[78,110,162,172],"becoming":[80],"more":[82],"sensible":[83],"vital":[85],"concern":[86],"today's":[88],"world.":[89],"Banking,":[90],"commerce,":[91],"government":[92],"agencies,":[93,98],"organizations',":[94],"army,":[96],"spy":[97],"enterprises,":[99],"businesses,":[100],"people's":[102],"daily":[103],"lives":[104],"all":[105,171],"employ":[106],"some":[112],"way.":[113],"Cryptography":[114],"employs":[115],"variety":[117,130],"algorithms":[119],"approaches":[121],"secure":[123],"networks":[124],"data.":[126],"We":[127],"covered":[128],"/":[133],"decryption":[134],"techniques,":[135],"well":[137],"cryptography":[139],"theories,":[140],"cryptosystem":[141],"types,":[142],"cryptographic":[145],"model":[146],"algorithm.":[148],"Reliability,":[149],"confidentially,":[150],"identification,":[151],"validity,":[152],"-":[153],"anti,":[154],"access":[156],"control":[157],"are":[158,170],"six":[160],"major":[161],"services.":[163],"Interception,":[164],"disruption,":[165],"illegal":[166],"access,":[167],"modification":[169],"dangers":[173],"information.":[176]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":5}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
